IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E99-A No.10  (Publication Date:2016/10/01)
[Whole issue]:PDF (25.1MB)
Previous | 
Next
Regular Section

pp.1762-1773  PAPER-Speech and Hearing
Speech Analysis Method Based on Source-Filter Model Using Multivariate Empirical Mode Decomposition
Surasak BOONKLA  Masashi UNOKI  Stanislav S. MAKHANOV  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1774-1781  PAPER-Digital Signal Processing
Multi-Sensor Multi-Target Bernoulli Filter with Registration Biases
Lin GAO  Jian HUANG  Wen SUN  Ping WEI  Hongshu LIAO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1782-1789  PAPER-Digital Signal Processing
An Effective Allocation of Non-Zero Digits for CSD Coefficient FIR Filters Using 0-1PSO
Takuya IMAIZUMI  Kenji SUYAMA  
Summary | Full Text:PDF (1010.3KB) >>Buy this Article

pp.1790-1798  PAPER-Digital Signal Processing
Statistical Analysis of Phase-Only Correlation Functions with Phase-Spectrum Differences Following Wrapped Distributions
Shunsuke YAMAKI  Masahide ABE  Masayuki KAWAMATA  
Summary | Full Text:PDF (3.1MB) >>Buy this Article

pp.1799-1805  PAPER-Digital Signal Processing
Virtual Sensor Idea-Based Geolocation Using RF Multipath Diversity
Zhigang CHEN  Lei WANG  He HUANG  Guomei ZHANG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1806-1812  PAPER-Nonlinear Problems
Steady-versus-Transient Plot for Analysis of Digital Maps
Hiroki YAMAOKA  Toshimichi SAITO  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.1813-1821  PAPER-Graphs and Networks
On the Three-Dimensional Channel Routing
Satoshi TAYU  Toshihiko TAKAHASHI  Eita KOBAYASHI  Shuichi UENO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1822-1832  PAPER-Cryptography and Information Security
Certificateless Key Agreement Protocols under Strong Models
Denise H. GOYA  Dionathan NAKAMURA  Routo TERADA  
Summary | Full Text:PDF (798KB) >>Buy this Article

pp.1833-1842  PAPER-Cryptography and Information Security
One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis
Seungkwang LEE  Nam-Su JHO  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1843-1855  PAPER-Intelligent Transport System
Coordinated Ramp Metering for Minimum Waiting Time and Limited Ramp Storage
Soobin JEON  Inbum JUNG  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.1856-1862  PAPER-Mathematical Systems Science
Non-Crossover and Multi-Mutation Based Genetic Algorithm for Flexible Job-Shop Scheduling Problem
Zhongshan ZHANG  Yuning CHEN  Yuejin TAN  Jungang YAN  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1863-1866  LETTER-Speech and Hearing
Spectral Features Based on Local Normalized Center Moments for Speech Emotion Recognition
Huawei TAO  Ruiyu LIANG  Xinran ZHANG  Li ZHAO  
Summary | Full Text:PDF (290.9KB) >>Buy this Article

pp.1867-1870  LETTER-Speech and Hearing
Automatic Model Order Selection for Convolutive Non-Negative Matrix Factorization
Yinan LI  Xiongwei ZHANG  Meng SUN  Chong JIA  Xia ZOU  
Summary | Full Text:PDF (165.5KB) >>Buy this Article

pp.1871-1875  LETTER-Digital Signal Processing
The Cooperative Recovery Scheme Using Adjacent Base Stations in the Wireless Communication System
Young-Min KO  Jae-Hyun RO  Hyoung-Kyu SONG  
Summary | Full Text:PDF (321.1KB) >>Buy this Article

pp.1876-1880  LETTER-Digital Signal Processing
Channel Impulse Response Measurements-Based Location Estimation Using Kernel Principal Component Analysis
Zhigang CHEN  Xiaolei ZHANG  Hussain KHURRAM  He HUANG  Guomei ZHANG  
Summary | Full Text:PDF (198.7KB) >>Buy this Article

pp.1881-1884  LETTER-Systems and Control
Memoryless and Adaptive State Feedback Controller for a Chain of Integrators with Unknown Delays in States and Input
Ho-Lim CHOI  
Summary | Full Text:PDF (134.2KB) >>Buy this Article

pp.1885-1887  LETTER-Algorithms and Data Structures
A Tight Analysis of Kierstead-Trotter Algorithm for Online Unit Interval Coloring
Tetsuya ARAKI  Koji M. KOBAYASHI  
Summary | Full Text:PDF (75.6KB) >>Buy this Article

pp.1888-1890  LETTER-Cryptography and Information Security
A Meet in the Middle Attack on Reduced Round Kiasu-BC
Mohamed TOLBA  Ahmed ABDELKHALEK  Amr M. YOUSSEF  
Summary | Full Text:PDF (134.9KB) >>Buy this Article

pp.1891-1894  LETTER-Cryptography and Information Security
An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
Kai HUANG  Ming XU  Shaojing FU  Yuchuan LUO  
Summary | Full Text:PDF (69.2KB) >>Buy this Article

pp.1895-1899  LETTER-Communication Theory and Signals
A Novel Data-Aided Feedforward Timing Estimator for Burst-Mode Satellite Communications
Kang WU  Tianheng XU  Yijun CHEN  Zhengmin ZHANG  Xuwen LIANG  
Summary | Full Text:PDF (198.9KB) >>Buy this Article

pp.1900-1903  LETTER-Mobile Information Network and Personal Communications
Two-Tier Mobile Data Aggregation in Wireless Sensor Networks
Daehee KIM  Sangbin LEE  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1904-1906  LETTER-Image
Iterative Image Dehazing Using the Dark Channel Prior
Sung-Ho LEE  Seung-Won JUNG  Sung-Jea KO  
Summary | Full Text:PDF (3MB) >>Buy this Article

Previous | 
Next
go to Page Top